Skip to main content

Recon 2005 - Kathy Wang - Using honeyclients to discover new attacks

Movies Preview

movies
Recon 2005 - Kathy Wang - Using honeyclients to discover new attacks


Published 2005


People who are interested in maintaining situational awareness often deploy honeypots. However, there are whole classes of attacks for which honeypot devices are not very useful, due to their passive nature.
Honeyclients are client-based applications that actively seek malicious servers to gather data for further analysis. This talk will focus on honeyclients, how they can be used, and will share interesting data that has been gathered with a honeyclient. As part of this presentation, an open-source honeyclient application will be released.

Bio
Kathy Wang has a background ranging from blowing up Alpha chips at DEC to authoring Morph, an OS fingerprint cloaker tool. She has spoken at many security conferences and events in the past, including DEFCON, HOPE, Notacon, and ToorCon. In 2001, Kathy co-founded Syn Ack Labs research group. She graduated from The University of Michigan with a BS and MS in electrical engineering, and is currently based in the Washington, D.C. area.


Audio/Visual sound, color
Contact Information www.recon.cx

comment
Reviews

There are no reviews yet. Be the first one to write a review.
SIMILAR ITEMS (based on metadata)
ReCon 2005 Videos
by Kathy Wang
movies
eye 7
favorite 0
comment 0
Community Video
movies
eye 682
favorite 1
comment 0
Community Video
movies
eye 1,574
favorite 0
comment 0
Community Video
movies
eye 2,703
favorite 1
comment 1
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Community Video
movies
eye 781
favorite 0
comment 0
Community Video
movies
eye 1,017
favorite 0
comment 0
Community Video
movies
eye 621
favorite 0
comment 0
Community Video
movies
eye 944
favorite 0
comment 0
Community Video
movies
eye 565
favorite 0
comment 0